• Title/Summary/Keyword: information behaviour

Search Result 427, Processing Time 0.024 seconds

A Study on the Implementation of Microscopic Traffic Simulation Model by Using GIS (GIS를 이용한 미시적 수준의 교통모형 구현에 관한 연구)

  • Kim, Byeongsun
    • Spatial Information Research
    • /
    • v.23 no.4
    • /
    • pp.79-89
    • /
    • 2015
  • This study aims to design and implement a traffic model that can simulate the traffic behavior on the microscopic level by using the GIS. In the design of the model, the vehicle in the simulation environment recognizes the GIS road centerline data as road network data reflecting number of lanes, speed limit and so on. In addition, the behavior model was designed by dividing functions into the environmental perception model, time headway distribution model, car following model, and lane changing model. The implemented model was applied to Jahamun-road of Jongno-gu district to verify the accuracy of the model. As a result, the simulation results on the Jahamun-road had no great error compared with the actual observation data. In the aspect of usability of model, it is judged that this model will be able to effectively contribute to analysis of amount of carbon emission by traffic, evaluation of traffic flow, plans for location of urban infrastructure and so on.

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.

Smart monitoring analysis system for tunnels in heterogeneous rock mass

  • Kim, Chang-Yong;Hong, Sung-Wan;Bae, Gyu-Jin;Kim, Kwang-Yeom;Schubert, Wulf
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.255-261
    • /
    • 2003
  • Tunnelling in poor and heterogeneous ground is a difficult task. Even with a good geological investigation, uncertainties with respect to the local rock mass structure will remain. Especially for such conditions, a reliable short-term prediction of the conditions ahead and outside the tunnel profile are of paramount importance for the choice of appropriate excavation and support methods. The information contained in the absolute displacement monitoring data allows a comprehensive evaluation of the displacements and the determination of the behaviour and influence of an anisotropic rock mass. Case histories and with numerical simulations show, that changes in the displacement vector orientation can indicate changing rock mass conditions ahead of the tunnel face (Schubert & Budil 1995, Steindorfer & Schubert 1997). Further research has been conducted to quantify the influence of weak zones on stresses and displacements (Grossauer 2001). Sellner (2000) developed software, which allows predicting displacements (GeoFit$\circledR$). The function parameters describe the time and advance dependent deformation of a tunnel. Routinely applying this method at each measuring section allows determining trends of those parameters. It shows, that the trends of parameter sets indicate changes in the stiffness of the rock mass outside the tunnel in a similar way, as the displacement vector orientation does. Three-dimensional Finite Element simulations of different weakness zone properties, thicknesses, and orientations relative to the tunnel axis were carried out and the function parameters evaluated from the results. The results are compared to monitoring results from alpine tunnels in heterogeneous rock. The good qualitative correlation between trends observed on site and numerical results gives hope that by a routine determination of the function parameters during excavation the prediction of rock mass conditions ahead of the tunnel face can be improved. Implementing the rules developed from experience and simulations into the monitoring data evaluation program allows to automatically issuing information on the expected rock mass quality ahead of the tunnel.

  • PDF

The Effects of Family Environment on Middle School Students' Health Promotion Behavior (중학생의 가정환경이 건강증진행위에 미치는 영향)

  • Park, Geum-Hi;Park, Young-Soo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.1 no.2
    • /
    • pp.73-85
    • /
    • 2000
  • This research has attempted to provide the basic data of health education in middle school students whose positions are very important in health promotion of the whole people. Especially, we are focused on the relationship between their individual family environment and health promotion behaviour. We have surveyed and collected all the information of the effects which has come from the family environment, and given the period from 22nd of May to 27Th with 375 boys and girl students who live in the cities and suburbs of Chung Cheong Buk-D, and used SPSS program in the analyse of the information. The conclusions were as follows; 1. Gender, the residential area, the living pattern with parents, and religion have showed very close effects in the promotion health behavior of the middle school students. 2. Statistically, explained health promotion behavior has got 59% and hygiene and daily life habit in inferior group has 48% with these rates, there should be a special management on those factors. 3. The responsibility according to the value direction factors of home has showed relationship as follows; $\circ$ hygiene and daily life habit(p<.001) $\circ$ communicable disease control(p<.01) $\circ$ mental health(p<.05) $\circ$ health promotion behavior(p<.001) The above results showed that the middle school students health promotion behavior were affected by the responsibility according to the value direction factors of family, the responsibility according to the group characteristics factors of family and psychological process factors of family. With this result, family environment is essential factor for students abilities of building up his/hers health promotion behavior.

  • PDF

Effects of Breast Cancer Fatalism on Breast Cancer Awareness among Nursing Students in Turkey

  • Kulakci, Hulya;Ayyildiz, Tulay Kuzlu;Yildirim, Nuriye;Ozturk, Ozlem;Topan, Aysel Kose;Tasdemir, Nurten
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.8
    • /
    • pp.3565-3572
    • /
    • 2015
  • Background: Breast cancer is the most common cancer among women and leading cause of death worldwide, including in Turkey. High perceptions of cancer fatalism are associated with lower rates of participation in screening for breast cancer. This study was conducted to evaluate the effect of breast cancer fatalism and other factors on breast cancer awareness among nursing students in Turkey. Materials and Methods: This cross-sectional descriptive study was conducted at three universities in the Western Black Sea region. The sample was composed of 838 nursing students. Data were collected by Personal Information Form, Powe Fatalism Inventory (PFI) and Champion's Health Belief Model Scale (CHBMS). Results: Breast cancer fatalism perception of the students was at a low level. It was determined that students; seriousness perception was moderate, health motivation, BSE benefits and BSE self-efficacy perceptions were high, and BSE barriers and sensitivity perceptions were low. In addition, it was determined that students awareness of breast cancer was affected by breast cancer fatalism, class level, family history of breast cancer, knowledge on BSE, source of information on BSE, frequency of BSE performing, having breast examination by a healthcare professional within the last year and their health beliefs. Conclusions: In promoting breast cancer early diagnosis behaviour, it is recommended to evaluate fatalism perceptions and health beliefs of the students and to arrange training programs for this purpose.

A Study on the Performance Analysis of Statistical Multiplexer by the Queueing Model (Queueing 모델에 의한 통계적 다중화기의 성능 분석에 관한 연구)

  • 이주식;김태준;김근배;이종현;임해진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 1992
  • In the already presented paper, the performance analysis of SMUX was need a lot of time bacause of recussive method, So this paper proposed the new mathematical method for the SMUX's performance. And it is constructed and analyzed the queueing model for SMUX based on the Go-back N retransmission ARQ model. It is assumed that it has the infinite buffer and a single server. It is analzied the parameters that have influence on the byffer and a single server. It is analzied the parameters that have influence on the buffer behaviour of statistical multiplexer overflow probabilities. maximum buffer size. mean wating time and mean buffer size, and these relationship are represented the graphs and datas which provided a guide to the buffer design problem. As these results. it is efficient when the SMUX is apphed that the traffic density is below 0.5 and transmission error probabilities is below 10­$^3$. So this paper can be applied to the basic and theoretical background prior to the implementation of SMUX.

  • PDF

A Comparative Study of Printed versus Digital Index and Abstract Users' Behaviour Patterns (인쇄형 색인초록과 전자형 색인초록의 이용행태에 관한 비교연구)

  • Hoang Gum-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.169-187
    • /
    • 1998
  • The primary purpose of this study is to compare printed index and abstract user's behaviours with digital index and abstract user's behaviours, and to verify of structured characteristics of a printed index and abstract. The major findings are as follows: (1) When the research topic is not specified enough, users tend to rely on printed indexes and abstracts search, whereas they utilize digital form in order to do retrospective search in the stage of research when the topic is determined. (2) Printed index and abstract users are expecting small number of literatures in search, whereas digital index and abstract users are expecting large number of literatures to be found The former are more satisfied with the result of search than the latter. (3) Digital index and abstract users experience more search failure than printed Index and abstract users. When they fail to find wanted materials, both users turn to the other form of indexes and abstracts. (4) Printed index and abstract users shows significantly less knowledge on online searching than digital index and abstract users.

  • PDF

Design and Implementation of User Agent for Internet Telephony Services based on SW (SIP 기반 인터넷 전화 서비스를 위한 사용자 에이전트의 설계 및 구현)

  • Huh Mi Young;Han Jaechon;Hyun Wook;Park Sun Ok;Kang Shin Gak;Kim Dae Young
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.350-358
    • /
    • 2005
  • Recently, VoIP technology is being accepted as are the most promising Internet telephony service, due to the substitution effect of traditional telephony service. Two standards, i.e, . H.323 and SIP. have emerged for signaling and control for Intemet telephony, of which SIP provides far lower complexity and rich extensibility. It is important to secure components of SIP in order to develop various services. Generally, open source codes provide basic functions of SIP as well as complicated structure, but are difficult to extend. In this thesis, we focused on offering interface mechanism between application and SIP User Agent to easily extend for various VoIP services. This thesis describes what function is needed for SIP User Agent, how to define the internal data structure, and how to define the internal processing procedure. The check iist derived through participating the interoperability event for stabilized SIP User Agent is also suggested.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

Relationships Between the Characteristics of the Business Data Set and Forecasting Accuracy of Prediction models (시계열 데이터의 성격과 예측 모델의 예측력에 관한 연구)

  • 이원하;최종욱
    • Journal of Intelligence and Information Systems
    • /
    • v.4 no.1
    • /
    • pp.133-147
    • /
    • 1998
  • Recently, many researchers have been involved in finding deterministic equations which can accurately predict future event, based on chaotic theory, or fractal theory. The theory says that some events which seem very random but internally deterministic can be accurately predicted by fractal equations. In contrast to the conventional methods, such as AR model, MA, model, or ARIMA model, the fractal equation attempts to discover a deterministic order inherent in time series data set. In discovering deterministic order, researchers have found that neural networks are much more effective than the conventional statistical models. Even though prediction accuracy of the network can be different depending on the topological structure and modification of the algorithms, many researchers asserted that the neural network systems outperforms other systems, because of non-linear behaviour of the network models, mechanisms of massive parallel processing, generalization capability based on adaptive learning. However, recent survey shows that prediction accuracy of the forecasting models can be determined by the model structure and data structures. In the experiments based on actual economic data sets, it was found that the prediction accuracy of the neural network model is similar to the performance level of the conventional forecasting model. Especially, for the data set which is deterministically chaotic, the AR model, a conventional statistical model, was not significantly different from the MLP model, a neural network model. This result shows that the forecasting model. This result shows that the forecasting model a, pp.opriate to a prediction task should be selected based on characteristics of the time series data set. Analysis of the characteristics of the data set was performed by fractal analysis, measurement of Hurst index, and measurement of Lyapunov exponents. As a conclusion, a significant difference was not found in forecasting future events for the time series data which is deterministically chaotic, between a conventional forecasting model and a typical neural network model.

  • PDF